Question No: 151

Which of the following is required to be backed up on a domain controller to recover Active Directory?

System state data

Operating System files

User#39;s personal data

Installed third party application#39;s folders

Answer: A

Question No: 152

A Host-based Intrusion Prevention System (HIPS) software vendor records how the Firefox Web browser interacts with the operating system and other applications, and identifies all areas of Firefox functionality. After collecting all the data about how Firefox should work, a database is created with this information, and it is fed into the HIPS software. The HIPS then monitors Firefox whenever it#39;s in use. What feature of HIPS is being described in this scenario?

Signature Matching

Application Behavior Monitoring

Host Based Sniffing

Application Action Modeling

Answer: B

Question No: 153

When should you create the initial database for a Linux file integrity checker?

Before a system is patched

After a system has been compromised

Before a system has been compromised

During an attack

Answer: C

Question No: 154

Which type of risk assessment results are typically categorized as low, medium, or high- risk events?

Technical

Qualitative

Management

Quantitative

Answer: B

Question No: 155

Which of the following statements about policy is FALSE?

A well-written policy contains definitions relating to quot;whatquot; to do.

A well-written policy states the specifics of quot;howquot; to do something.

Security policy establishes what must be done to protect information stored on computers.

Policy protects people who are trying to do the right thing.

Answer: D

Question No: 156

Two clients connecting from the same public IP address (for example – behind the same NAT firewall) can connect simultaneously to the same web server on the Internet, provided what condition is TRUE?

The server is not using a well-known port.

The server is on a different network.

The client-side source ports are different.

The clients are on different subnets.

Answer: C

Question No: 157

Which of the following is TRUE regarding the ability of attackers to eavesdrop on wireless communications?

Eavesdropping attacks cannot be performed through concrete walls.

Eavesdropping attacks can take place from miles away.

Eavesdropping attacks are easily detected on wireless networks.

Eavesdropping attacks require expensive devices.

Answer: B

Question No: 158

What technical control provides the most critical layer of defense if an intruder is able to bypass all physical security controls and obtain tapes containing critical data?

Camera Recordings

Security guards

Encryption

Shredding

Corrective Controls

Answer: C

Question No: 159

You work as a Network Administrator for Net Perfect Inc. The company has a Linux-based network. You have created a folder named Report. You have made David the owner of the folder. The members of a group named JAdmin can access the folder and have Read, Write, and Execute permissions. No other user can access the folder. You want to ensure that the members of the JAdmin group do not have Write permission on the folder. Also, you want other users to have Read permission on the Report folder.

Which of the following commands will you use to accomplish the task?

chmod 777 report

chown david.jadmin report

chmod 555 report

chmod 754 report

Answer: D

Question No: 160

Which of the following systems acts as a NAT device when utilizing VMware in NAT mode?